Viewing Fortify WebInspect Scan Results in Fortify Software Security Center

Fortify WebInspect saves scan results (results data and auditClosedThe process of assessing an application or program for security vulnerabilities. data) in FPR format, which you can upload to Fortify Software Security Center. (See Uploading Scan Artifacts.) Fortify WebInspect issue details differ somewhat from those shown for issues uncovered by other analyzers, such as Fortify Static Code Analyzer.

Important! To successfully integrate Fortify WebInspect with Fortify Software Security Center, you must install a trusted CA certificate on the Java Runtime environment on both the Fortify Software Security Center and WebInspect servers.

In the left panel of the CODE tab, the Overview section displays summary information about the finding and the Implications section. The Additional References section lists any pertinent references available.

The center panel displays the following information:

URL: Website page on which the vulnerabilityClosedA weakness that allows an attacker to reduce a system’s information assurance. Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw. To exploit a vulnerability, an attacker must have at least one applicable tool or technique that can connect to a system weakness. (same as issue) was detected

Method: HTTP methodClosedAn action that a web service performs. For instance, one web service may have one WSDL that contains four operations. Those might be, for example, Update, Create, Delete, and Diagnostic. (Same as operation). used for the attack (for example GET, PUT, and POST)

Vulnerable Parameter: Name of the vulnerable parameterClosedAn item of information, such as a name, a selection, or a number, passed to a program by another program or an end-user.

Attack Payload: Shellcode used as the payloadClosedA discrete software unit deployed over a network. for exploiting the vulnerability

Below this information, the Request section displays the request made, with the attack highlighted. The Response section displays the response to the request, with the trigger highlighted.

Note: If responses contain binary data or a large volume of data (more than 50 KB), you can see the Download Response button at the bottom of the Response section. To download responses such as these in a text file, click Download Response.

The Steps tab is available only if the steps are included in the WebInspect results file.

Viewing Additional Details and Recommendations

To view additional details and recommendations for the issue, on the issue toolbar, click one of the following:

On the right, the DETAILS section provides suggestions on what to look for in this issue.

To view recommendations and tips on how to address the issue, from the DETAILS list, select Recommendations.

For information about how to use the panel on the right to audit the issue, see Auditing Issues.